Safety & Security

The implementation of robust authentication & authorization mechanisms is a fundamental step in protecting iacs from potential cyber threats and is integral to the overall cybersecurity strategy outlined by the iec 62443 standards.
There’s a fundamental shift in security philosophy that requires a change in mindset
Wildfire in Pacific Palisades, Los Angeles, January 8, 2025, towards Getty Center and Brentwood
Improvements to municipal water systems can help avoid a repeat of the Pacific Palisades and other Los Angeles-area fires
A Control Amplified podcast with Joe Weiss, managing partner, Applied Control Solutions Inc.
A 5-sided metal die with a shield and keyhole security symbol on each face of the die
Seven system integrators show how they provide clients in multiple process industries with suitable and successful cybersecurity protections
Source: SOCAR and Honeywell
State Oil Co. of the Azerbaijan Republic’s (SOCAR) Turkey Aegean Refinery (STAR) in Aliaga, Izmir province can process 214,000 barrels of crude oil daily, and implemented Honeywell’s Forge managed security services (MSS) to increase cyber-resilience, expedite risk mitigation, shorten recovery time and improves safety record.
SOCAR Turkey Aegean Refinery (STAR) deploys Honeywell’s Forge managed security services across expanding ICS and PCN attack surfaces
Lutz-Jesco
Source: Lutz-Jesco
Vacuum regulator enables controlled dosing of up to 10 kg of chlorine gas per hour
shutterstock_2541409041
Control system cybersecurity still has not been adequately addressed by Democratic and Republican administrations since PDD63
B&R
Source: B&R
B&R’s Safety+ adds flexibility in choosing programming languages and data types
shutterstock_1353888704
Inappropriate advice from inadequate “OT experts” can harm control system field devices and shut down facilities
shutterstock_2514594583
How a bicycle’s analog odometer could be more secure than critical infrastructures in the U.S.
shutterstock_2324657777
Emerson, Red Lion, Rockwell and Yokogawa guide users through newly released European Union cybersecurity standards and other recent requirements